K Labs goes along with you providing you with its Certified Trainers, Training Laboratories, Exam Simulators, the Test Center and a dedicated Tutor that helps you to prepare for the exam.
Thanks to our support, the percentage of candidates who obtain the certification at the first attempt is very close to 100%.
DURATION
5 days
OBJECTIVES
A CyberSec First Responder is the first line of defense against cyber-attacks that can cost an organization valuable time and money. The CyberSec First Responder: Threat Detection and Response course, or CFR, will prepare security professionals to become the first responders who defend against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents.
WHO SHOULD ATTEND
Ideal for those with 2+ years of experience in IT or information security, CFR prepares cyber security professionals for performing numerous tasks within an organization. From developing secure networks to identifying breaches in real time, CFR equips professionals with the skills they need to keep the hackers out.
TOPICS
Assessing Information Security Risk
Identify the Importance of Risk Management
Assess Risk
Mitigate Risk
Integrate Documentation into Risk Management
Creating an Information Assurance Lifecycle Process
Evaluate Information Assurance Lifecycle Models
Align Information Security Operations to the Information Assurance Lifecycle
Align Information Assurance and Compliance Regulations
Analyzing Threats to Computing and Network Environments
Identify Threat Analysis Models
Assess the Impact of Reconnaissance Incidents
Assess the Impact of Systems Hacking Attacks
Assess the Impact of Malware
Assess the Impact of Hijacking and Impersonation Attacks
Assess the Impact of DoS Incidents
Assess the Impact of Threats to Mobile Security
Assess the Impact of Threats to Cloud Security
Designing Secure Computing and Network Environments
Information Security Architecture Design Principles
Design Access Control Mechanisms
Design Cryptographic Security Controls
Design Application Security
Design Computing Systems Security
Design Network Security
Operating Secure Computing and Network Environments
Implement Change Management in Security Operations
Implement Monitoring in Security Operations
Assessing the Security Posture Within a Risk Management Framework
Deploy a Vulnerability Management Platform
Conduct Vulnerability Assessments
Conduct Penetration Tests on Network Assets
Follow Up on Penetration Testing
Collecting Cybersecurity Intelligence Information
Deploy a Security Intelligence Collection and Analysis Platform
Collect Data from Security Intelligence Sources
Analyzing Cybersecurity Intelligence Information
Analyze Security Intelligence to Address Incidents
Use SIEM Tools for Analysis
Responding to Cybersecurity Incidents
Deploy an Incident Handling and Response Architecture
Perform Real-Time Incident Handling Tasks
Prepare for Forensic Investigation
Investigating Cybersecurity Incidents
Create a Forensic Investigation Plan
Securely Collect Electronic Evidence
Identify the Who, Why, and How of an Incident
Follow Up on the Results of an Investigation
Auditing Secure Computing and Network Environments
Deploy a Systems and Processes Auditing Architecture
Prepare for Audits
Perform Audits Geared Toward the Information Assurance Lifecycle
List of Security Resources
K Labs S.R.L.
Tel. +39 059 8212 29 | info@klabs.it
VAT IT02034520367